Due to missing authorization check, an authenticated attacker could call a remote-enabled function module which allows them to access data that they would otherwise not have access to. The attacker cannot modify data or impact the availability of the system.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.